a hacker in iraq michael schearer (theprez98) presents
TRANSCRIPT
![Page 1: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/1.jpg)
A Hacker in A Hacker in IraqIraq
Michael Schearer Michael Schearer (“theprez98”)(“theprez98”)
presents
![Page 2: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/2.jpg)
Plan of AttackPlan of Attack
IntroductionDisclaimersMy BackgroundWhy is the Navy in Iraq?IEDs
Composition, Typology, Counter-IED Strategy
The Future
![Page 3: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/3.jpg)
IntroductionIntroduction
Operational Security (OPSEC)Challenges and Limitations
![Page 4: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/4.jpg)
DisclaimersDisclaimers
This presentation is UNCLASSIFIED. On some issues I may be able to speak in generalities but not specifics.Nothing in this presentation is classified or “For Official Use Only,” nor does it contain information regarding incidents under ongoing investigation or any information protected by the Privacy Act.
![Page 5: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/5.jpg)
DisclaimersDisclaimers
This presentation complies with DOD Directives 5230.9, 5400.7, and 5500.7.All images, videos and/or media within this presentation were obtained from open sources using unclassified search terms.I am not here as a representative of the U.S. government or U.S. Navy.I am not here to be “for” or “against” the war. Please leave your politics at the door!
![Page 6: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/6.jpg)
My BackgroundMy Background
Active Duty, U.S. Navy Lieutenant (O-3)EA-6B Prowler Electronic Countermeasures Officer (Naval Flight Officer)Licensed Extra Class Amateur Radio Operator (N3WI)Church of Wifi Forums Administrator“Regular” on DEFCON and NetStumbler forums
![Page 7: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/7.jpg)
![Page 8: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/8.jpg)
![Page 9: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/9.jpg)
Why is the Navy in Iraq?Why is the Navy in Iraq?Threat from Improvised Explosive Devices
Army asked for help
Indigenous Navy electronic warfare capability
JCCS-1
+
+
=
![Page 10: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/10.jpg)
The Electronic Warfare The Electronic Warfare MissionMission
“Suppress the RCIED threat to Coalition Forces and reduce casualties through
enhanced electronic warfare coordination and JCREW operations, training and
readiness.”33http://www.militaryhomefront.dod.mil/campvictory/
![Page 11: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/11.jpg)
Improvised Explosive Improvised Explosive DevicesDevices
What makes up an IED?Initiator
DetonatorExplosive charge
![Page 12: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/12.jpg)
InitiatorsInitiators
Command-wire (CWIED)Victim-operated (VOIED)Vehicle-borne (VBIED)Radio-controlled (RCIED)
4MNC-I Public Affairs Office; reprinted athttp://www.arcent.army.mil/news/archive/2005_news/march/new_organization.asp;
also http://www.defenselink.mil/news/BriefingSlide.aspx?BriefingSlideID=14
![Page 13: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/13.jpg)
RC InitiatorsRC Initiators
![Page 14: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/14.jpg)
DetonatorsDetonators
![Page 15: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/15.jpg)
Explosive chargesExplosive charges
![Page 16: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/16.jpg)
Attacking the IED Attacking the IED ProblemProblem
Eliminate source materials
Eliminate the IED network
Eliminate bomb emplacers
Prevent detonation
Protect against explosion
![Page 17: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/17.jpg)
Eliminating Source Eliminating Source Materials: InitiatorsMaterials: Initiators
Initiators have become dual-use technologies– Designed for non-military purposes– Exploited as initiation devices for IEDs
Plentiful supplyVirtually impossible to trackRequired for basic governmental functions
![Page 18: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/18.jpg)
Eliminating Source Eliminating Source Materials: InitiatorsMaterials: Initiators
Iraqi landline network virtually non-existentExtremely costly to rebuild ($1+ billion)Cell networks began installation 2003-04Iraqi cell phone providers (GSM 900)– Iraqna, Asia Cell, Atheer, Korek, SanaTel– 2004: 1.4 million subscribers– 2006: 7.1+ million subscribers
![Page 19: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/19.jpg)
IRAQNA COVERAGE MAP
![Page 20: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/20.jpg)
ASIA CELL COVERAGE MAP
![Page 21: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/21.jpg)
Eliminating Source Eliminating Source Materials: DetonatorsMaterials: Detonators
Detonators are also dual-use technologies– Legitimate uses particularly
in construction (especially given the massive rebuilding effort)
– Exploited as initiation devices for IEDs
Plentiful supplyVirtually impossible to track
![Page 22: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/22.jpg)
Eliminating Source Eliminating Source Materials: Explosive Materials: Explosive
chargeschargesHuge caches of unused ordnance left over from the Iran-Iraq War (1980-88) and Gulf War (1991)– Artillery shells, mortar shells,
unexploded ordnance
Focus on WMD and major conventional weapons systemsPlentiful supplyVirtually impossible to track
![Page 23: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/23.jpg)
Attacking the IED Attacking the IED ProblemProblem
Eliminate source materials
Eliminate the IED network
Eliminate bomb emplacers
Prevent detonation
Protect against explosion
![Page 24: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/24.jpg)
Eliminating the IED Eliminating the IED NetworkNetwork
Locate and eliminate the financiers and support structure behind IED-making cells5
JIEDDO Budget for “offensive operations” grown from 13% in FY06 to 31% in FY076
5http://www.defenselink.mil/transcripts/transcript.aspx?transcriptid=39016http://www.defenselink.mil/news/newsarticle.aspx?id=3275
0
2000
4000
6000
8000
10000
12000
Sep Oct Jan
Tips
![Page 25: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/25.jpg)
Eliminating the IED Eliminating the IED Network: CEXCNetwork: CEXC
Combined Coalition
Explosives IEDs
ExploitationForensic
investigation and hardware hacking
Cell Group
![Page 26: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/26.jpg)
Eliminating the IED Eliminating the IED Network:Network:
CEXCCEXC“CEXC provides technical and operational analysis of the improvised bombs the insurgents have used against coalition forces, and develops measures to counter the bombing campaign.”7
7http://www.washtimes.com/national/20050316-110733-3348r.htm
![Page 27: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/27.jpg)
Eliminating the IED Eliminating the IED Network:Network:
TEDACTEDACThe U.S. Government explosives community, including the FBI, the Department of Defense, and the Bureau of Alcohol, Tobacco, and Firearms, collectively formed the Terrorist Explosive Device Analytical Center (“TEDAC”). Located at the FBI Laboratory in Quantico, Virginia, the TEDAC acts as a single inter agency focal point to coordinate and manage the unified effort of law enforcement, intelligence and military assets as it relates to terrorist IEDs, and to technically and forensically exploit all IEDs …88http://www.usdoj.gov/opa/motion_dna.pdf; see also
http://www.fbi.gov/page2/aug04/jordan081104.htm
![Page 28: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/28.jpg)
Attacking the IED Attacking the IED ProblemProblem
Eliminate source materials
Eliminate the IED network
Eliminate bomb emplacers
Prevent detonation
Protect against explosion
![Page 29: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/29.jpg)
Eliminate Bomb Eliminate Bomb EmplacersEmplacers
Emplaces IED at target locationMay or may not be part of the IED networkMay or may not arm/initiate the deviceMay be involved in video-taping the incidentEliminating bomb emplacers:– Tips– Community pressure– $$$
![Page 30: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/30.jpg)
Attacking the IED Attacking the IED ProblemProblem
Eliminate source materials
Eliminate the IED network
Eliminate bomb emplacers
Prevent detonation
Protect against explosion
![Page 31: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/31.jpg)
Prevent DetonationPrevent Detonation
My primary job in Iraq“Suppress the RCIED threat to Coalition Forces and reduce casualties through enhanced electronic warfare coordination and JCREW operations, training and readiness.”9
Jammers– Airborne, Vehicle-mounted, Dismounted– Different models/manufacturers– Different capabilities– That’s all I have to say about that…
9http://www.militaryhomefront.dod.mil/campvictory/
![Page 32: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/32.jpg)
Attacking the IED Attacking the IED ProblemProblem
Eliminate source materials
Eliminate the IED network
Eliminate bomb emplacers
Prevent detonation
Protect against explosion
![Page 33: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/33.jpg)
Protect Against Protect Against ExplosionExplosion
Armor protection: It’s not really just about “more”– HHS/brittle/spalling– RHA/spall protection
![Page 34: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/34.jpg)
Protect Against Protect Against ExplosionExplosion
More armor means more weight– Decreases maneuverability/speed– Increases rollover potential (higher
COG)– Increases maintenance on engines and
transmissions
Underbody vs. sidesV-shaped hulls
![Page 35: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/35.jpg)
The FutureThe Future
Detection of IEDs using unintentional radiated emissions10
Explosive resistant coating to add protection without adding significant weight11
“Local Eyes” sensor network12
10http://web.umr.edu/~daryl/IEDs/11http://www.ara.com/whatnew/lead/dragonshield/explosive%20resistant%20coating.htm12http://www.nationaldefensemagazine.org/issues/2006/December/ResearchersTout.htm
![Page 36: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/36.jpg)
The FutureThe Future
Hyperspectral sensors13
Answers to the Explosively Formed Penetrator (EFP)
13http://www.nationaldefensemagazine.org/issues/2006/December/ResearchersTout.htm
![Page 37: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/37.jpg)
AcknowledgementsAcknowledgements
The Shmoo Group/Shmoocon StaffThe Church of WifiMy Family
See AlsoSee AlsoWPA hash tablesDEFCON Wireless Village
![Page 38: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/38.jpg)
Questions?Questions?
![Page 39: A Hacker in Iraq Michael Schearer (theprez98) presents](https://reader036.vdocuments.mx/reader036/viewer/2022062511/55145c84550346284e8b56aa/html5/thumbnails/39.jpg)
A Hacker in A Hacker in IraqIraq
Michael Schearer Michael Schearer (“theprez98”)(“theprez98”)
presents